HEAD
New Scheme Based on AICTE Flexible Curricula
CSE- Internet of Things and Cyber Security Including Block Chain Technology
Explain the core concepts of the cloud computing paradigm
Demonstrate knowledge of virtualization
Explain the core issues of cloud computing such as security, privacy, and interoperability.
Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions
References:
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
Describe in-depth about theories, methods, and algorithms in machine learning.
Find and analyze the optimal hyper parameters of the machine learning algorithms.
Examine the nature of a problem at hand and determine whether machine learning can solve it efficiently.
Solve and implement real world problems using machine learning.
Introduction to machine learning, Machine learning life cycle, Types of Machine Learning System (supervised and unsupervised learning, Batch and online learning, Instance-Based and Model based Learning), scope and limitations, Challenges of Machine learning, data visualization, hypothesis function and testing, data pre-processing, data augmentation, normalizing data sets, , Bias-Variance tradeoff, Relation between AI (Artificial Intelligence), ML (Machine Learning), DL (Deep Learning) and DS (Data Science).
Clustering in Machine Learning: Types of Clustering Method: Partitioning Clustering, Distribution Model-Based Clustering, Hierarchical Clustering, Fuzzy Clustering. Birch Algorithm, CURE Algorithm. Gaussian Mixture Models and Expectation Maximization. Parameters estimations – MLE, MAP. Applications of Clustering.
Incremental PCA. Kernel PCA: Selecting a Kernel and Tuning Hyper parameters. Learning Theory: PAC and VC model.
Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; First edition (2017).
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for Data Scientists", Shroff/O'Reilly; First edition (2016).
Leonard Kaufman and P. J. Rousseau. Finding groups in data: An introduction to cluster analysis, Wiley, 2005
NelloCristianini and John Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press, 2000.
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools , Pearson Education
Raghavan, Compiler Design, TMH Pub.
Louden. Compiler Construction: Principles and Practice, Cengage Learning
A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
Mak, writing compiler & Interpreters, Willey Pub.
Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code, First Edition (2010):Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard. ISBN-10: 0470613033, ISBN-13: 978- 0470613030. Wiley Publications
Malware: Fighting Malicious Code: Ed Skoudis and Lenny Zeltser (2003). ISBN-10: 0131014056, ISBN-13: 978-0131014053. Prentice Hall Publications.
Malware Forensics: Investigating and Analyzing Malicious Code: Cameron H. Malin, Eoghan Casey, and JamesM. Aquilina (2008). ISBN-10: 159749268X, ISBN-13: 978- 1597492683. Syngress Publications.
This course teaches students the underlying principles and many of the techniques associated with the cybersecurity practice known as penetration testing or ethical hacking.
Students will learn about the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting.
The course will provide the fundamental information associated with each of the methods employed and insecurities identified. In all cases, remedial techniques will be explored.
Students will develop an excellent understanding of current cybersecurity issues and ways that user, administrator, and programmer errors can lead to exploitable insecurities.
Textbooks:
Hacking Exposed 7: Network Security Secrets and Solutions, Stuart McClure, Joel Scambray, George Kurtz, © 2012, McGraw Hill, ISBN 978-0-07-178028-5.
Beaver, Kevin. Hacking for dummies. 6th ed. John Wiley & Sons, 2018. Web Resources:
Open Web Application Security (OWASP): https://owasp.org/
Certified Ethical Hacker(CEH) by EC-Council
Unit I: Cyber Physical Systems in Real world, Basic Principle of Cyber Physical Systems, Industry 4.0, IIoT, Cyber Physical System Design and system requirements, Cyber Physical Systems Design Recommendations, CPS system requirements, Cyber Physical System Application, Case study of Cyber Physical Systems
Unit II: Cyber Physical System Platforms, Hardware platforms for Cyber Physical Systems (Sensors/Actuators, Microprocessor/Microcontrollers), Wireless Technologies for Cyber Physical Systems
Unit III: Cyber Physical System – Models and Dynamics Behaviours Continuous Dynamics, Discrete dynamics, Hybrid Systems, Concurrent Models of computation, Structure of Models, Synchronous Reactive models, Dataflow models of computation, Timed models of computation
Unit IV: Study of Embedded Systems vs Internet of Things vs Cyber Physical System Design of Embedded Systems (I/O Units, Multitasking and Scheduling), Internet of Things Architecture, CPS Architecture
Unit V: Security and Privacy in Cyber Physical Systems Security and Privacy Issues in CPSs, Local Network Security for CPSs, Internet-Wide Secure Communication, Security and Privacy for Cloud- Interconnected CPSs, Case Study: Cybersecurity in Digital Manufacturing/Industry 4.
Text Book(s)
Principles of Cyber Physical Systems, Rajeev Alur, MIT Press, 2015
E. A. Lee, Sanjit Seshia , "Introduction to Embedded Systems – A Cyber–Physical Systems Approach", Second Edition, MIT Press, 2017, ISBN: 978-0-262-53381-2
Guido Dartmann, Houbing song, Anke schmeink, “Big data analytics for Cyber Physical System”, Elsevier, 2019
Houbing song, Danda B Rawat, Sabina Jeschke, Christian Brecher, “Cyber Physical Systems Foundations, Principles and Applications”, Elsevier, 2017
Chong Li, Meikang Qiu, “Reinforcement Learning for Cyber Physical Systems with Cyber Securities Case Studies”, CRC press, 2019
Houbing Song, Glenn A.Fink, Sabina Jesche, “Security and Privacy in Cyber-Physical
Systems: Foundations, Principles and Solutions”, IEEE Press.
Describe the basics of securing Internet of Things.
Explain architecture and threats in IoT.
Analyze various privacy schemes related to IoT
Describe the authentication mechanisms for IoT security and privacy.
Explain security issues for various applications using case studies
Shancang Li, Li Da Xu, “Securing the Internet of Things,” Syngress (Elsevier)publication, 2017, ISBN: 978-0-12-804458-2.
Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms, andImplementations,” CRC Press (Taylor & Francis Group), 2016, ISBN:978-1-4987- 23190.
Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A Hands-on approach,” VPTPublishers, 2014, ISBN: 978-0996025515.
Alasdair Gilchris, “Iot Security Issues,” Walter de Gruyter GmbH & Co, 2017.
Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi, “Security Challenges andApproaches in Internet of Things,” Springer, 2016. 6. Brian Russell, Drew Van Duren,“Practical Internet of Things Security,” Packet Publishing Ltd, 2016.
Understand the role of IIOT in manufacturing processes
Apply knowledge of IIoT design considerations and IIoT technologies to develop solutions for industries
Collect, communicate and leverage the IIoT data
Analyze the IIoT data by using various machine learning algorithms
Identify, formulate and solve engineering problems by using Industrial IoT.
Unit I: Introduction to Industrial Internet of Things and Industry 4.0: Basics of Industry 4.0, Basics of Industrial Internet of Things (IIoT), Evolution of IIoT – understanding the IT & OT (Operational Technology) convergence, OT components like Industrial control systems, PLC, SCADA, and DCS, Industrial Edge, Open loop and closed loop controls, Components of IIOT, Role of IIOT in Manufacturing Processes, Challenges & Benefits in implementing IIOT, Adoption of IIoT, Market trends and opportunities in IIoT
Unit II: Technological Aspects of Industry 4.0 and IIoT: Industrial processes, Industrial sensing and actuation, Industrial networks, Machine-to-machine networks, Business Models and Reference Architecture of IIoT, IIoT design considerations, Key Technologies: Off-site Technologies, On-site Technologies
Unit IV: IIoT Analytics: Big Data Analytics and Software Defined Networks, Machine Learning and Data Science in Industries, Security and Fog computing in IIoT
Unit V: Applications of IIoT and Case Studies: Healthcare Applications in Industries, Inventory Management and Quality Control, Plant Safety and Security, Oil, chemical and pharmaceutical industry, Integration of products, processes, and people, Smart factories and cyber-physical systems, Case Studies, IIoT Application Development, Protocols used in building IIoT applications
“Introduction to Industrial Internet of Things and Industry 4.0”, By Sudip Misra Chandana Roy,Anandarup Mukherjee, CRC Press, 2020
“Industrial Internet of Things for Developers”, Ryane Bohm, Wiley
“Handbook of Industry 4.0 and Smart Systems”, Diego Galar Pascual, Pasquale Daponte, UdayKumar, CRC Press, 2019
Data-driven decisions, data pipeline infrastructure for data-driven decisions, role of the data engineer in data-driven organizations, Modern data strategies, Introduction to elements of Data, the five Vs of data – volume, velocity, variety, veracity, and value, Variety – data types & data sources, Activities to improve veracity and value.
The evolution of data architectures, Modern data architecture on various cloud platforms, Modern data architecture pipeline - Ingestion and storage, Modern data architecture pipeline - Processing and Consumption, Streaming analytics pipeline
Cloud security, Security of analytics workloads, ML security, Scaling Data Pipeline, creating a scalable infrastructure, Creating scalable components.
ETL and ELT comparison, Data wrangling, Data Discovery, Data structuring, Data Cleaning, Data enriching, Data validating, Data publishing
Comparing batch and stream ingestion, Batch ingestion processing, Purpose-built data ingestion tools, Scaling considerations for batch processing, stream processing, Scaling considerations for stream processing, Ingesting IoT data by stream
Storage in the modern data architecture, Data Lake storage, Data warehouse storage, Purpose-built databases, Storage in support of the pipeline, Securing storage.
Big data processing concepts, Apache Hadoop, Apache Spark, Amazon EMR
ML Concepts, ML Lifecycle, Framing the ML problem to meet the business goal, Collecting data, Applying labels to training data with known targets, Pre-processing data, Feature engineering, Developing a model, Deploying a model, ML infrastructure on AWS, AWS SageMaker, Automating the Pipeline, Automating infrastructure deployment, CI/CD, Automating with Step Functions.
7 - 10 experiments to be framed as per the syllabus.
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems, by Martin Kleppmann
T-SQL Querying (Developer Reference) by Itzik Ben-Gan
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modelling by Margy Ross
Spark: The Definitive Guide: Big Data Processing Made Simple by Bill Chambers
Data Pipelines with Apache Airflow by Bas P. Harenslak
Streaming Systems: The What, Where, When, and How of Large-Scale Data Processing by Tyler Akidau
Kubernetes in Action by Marko Luksa
New Scheme Based on AICTE Flexible Curricula
CSE- Internet of Things and Cyber Security Including Block Chain Technology
Explain the core concepts of the cloud computing paradigm
Demonstrate knowledge of virtualization
Explain the core issues of cloud computing such as security, privacy, and interoperability.
Choose the appropriate technologies, algorithms, and approaches for the related issues.
Identify problems, and explain, analyze, and evaluate various cloud computing solutions
References:
Dr.Kumar Saurabh, “Cloud Computing”, Wiley India.
Ronald Krutz and Russell Dean Vines, “Cloud Security”, Wiley-India.
Judith Hurwitz, R.Bloor, M.Kanfman, F.Halper, “Computing for Dummies”, Wiley India Edition.
Anthony T.Velte Toby J.Velte, “Cloud Computing – A Practical Approach”, TMH.
Barrie Sosinsky, ‘Cloud Computing Bible”, Wiley India.
Describe in-depth about theories, methods, and algorithms in machine learning.
Find and analyze the optimal hyper parameters of the machine learning algorithms.
Examine the nature of a problem at hand and determine whether machine learning can solve it efficiently.
Solve and implement real world problems using machine learning.
Introduction to machine learning, Machine learning life cycle, Types of Machine Learning System (supervised and unsupervised learning, Batch and online learning, Instance-Based and Model based Learning), scope and limitations, Challenges of Machine learning, data visualization, hypothesis function and testing, data pre-processing, data augmentation, normalizing data sets, , Bias-Variance tradeoff, Relation between AI (Artificial Intelligence), ML (Machine Learning), DL (Deep Learning) and DS (Data Science).
Clustering in Machine Learning: Types of Clustering Method: Partitioning Clustering, Distribution Model-Based Clustering, Hierarchical Clustering, Fuzzy Clustering. Birch Algorithm, CURE Algorithm. Gaussian Mixture Models and Expectation Maximization. Parameters estimations – MLE, MAP. Applications of Clustering.
Incremental PCA. Kernel PCA: Selecting a Kernel and Tuning Hyper parameters. Learning Theory: PAC and VC model.
Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; First edition (2017).
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for Data Scientists", Shroff/O'Reilly; First edition (2016).
Leonard Kaufman and P. J. Rousseau. Finding groups in data: An introduction to cluster analysis, Wiley, 2005
NelloCristianini and John Shawe-Taylor, An Introduction to Support Vector Machines, Cambridge University Press, 2000.
A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools , Pearson Education
Raghavan, Compiler Design, TMH Pub.
Louden. Compiler Construction: Principles and Practice, Cengage Learning
A. C. Holub. Compiler Design in C , Prentice-Hall Inc., 1993.
Mak, writing compiler & Interpreters, Willey Pub.
Malware Analyst’s Cookbook and DVD: Tools and Techniques for Fighting Malicious Code, First Edition (2010):Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard. ISBN-10: 0470613033, ISBN-13: 978- 0470613030. Wiley Publications
Malware: Fighting Malicious Code: Ed Skoudis and Lenny Zeltser (2003). ISBN-10: 0131014056, ISBN-13: 978-0131014053. Prentice Hall Publications.
Malware Forensics: Investigating and Analyzing Malicious Code: Cameron H. Malin, Eoghan Casey, and JamesM. Aquilina (2008). ISBN-10: 159749268X, ISBN-13: 978- 1597492683. Syngress Publications.
This course teaches students the underlying principles and many of the techniques associated with the cybersecurity practice known as penetration testing or ethical hacking.
Students will learn about the entire penetration testing process including planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting.
The course will provide the fundamental information associated with each of the methods employed and insecurities identified. In all cases, remedial techniques will be explored.
Students will develop an excellent understanding of current cybersecurity issues and ways that user, administrator, and programmer errors can lead to exploitable insecurities.
Textbooks:
Hacking Exposed 7: Network Security Secrets and Solutions, Stuart McClure, Joel Scambray, George Kurtz, © 2012, McGraw Hill, ISBN 978-0-07-178028-5.
Beaver, Kevin. Hacking for dummies. 6th ed. John Wiley & Sons, 2018. Web Resources:
Open Web Application Security (OWASP): https://owasp.org/
Certified Ethical Hacker(CEH) by EC-Council
Unit I: Cyber Physical Systems in Real world, Basic Principle of Cyber Physical Systems, Industry 4.0, IIoT, Cyber Physical System Design and system requirements, Cyber Physical Systems Design Recommendations, CPS system requirements, Cyber Physical System Application, Case study of Cyber Physical Systems
Unit II: Cyber Physical System Platforms, Hardware platforms for Cyber Physical Systems (Sensors/Actuators, Microprocessor/Microcontrollers), Wireless Technologies for Cyber Physical Systems
Unit III: Cyber Physical System – Models and Dynamics Behaviours Continuous Dynamics, Discrete dynamics, Hybrid Systems, Concurrent Models of computation, Structure of Models, Synchronous Reactive models, Dataflow models of computation, Timed models of computation
Unit IV: Study of Embedded Systems vs Internet of Things vs Cyber Physical System Design of Embedded Systems (I/O Units, Multitasking and Scheduling), Internet of Things Architecture, CPS Architecture
Unit V: Security and Privacy in Cyber Physical Systems Security and Privacy Issues in CPSs, Local Network Security for CPSs, Internet-Wide Secure Communication, Security and Privacy for Cloud- Interconnected CPSs, Case Study: Cybersecurity in Digital Manufacturing/Industry 4.
Text Book(s)
Principles of Cyber Physical Systems, Rajeev Alur, MIT Press, 2015
E. A. Lee, Sanjit Seshia , "Introduction to Embedded Systems – A Cyber–Physical Systems Approach", Second Edition, MIT Press, 2017, ISBN: 978-0-262-53381-2
Guido Dartmann, Houbing song, Anke schmeink, “Big data analytics for Cyber Physical System”, Elsevier, 2019
Houbing song, Danda B Rawat, Sabina Jeschke, Christian Brecher, “Cyber Physical Systems Foundations, Principles and Applications”, Elsevier, 2017
Chong Li, Meikang Qiu, “Reinforcement Learning for Cyber Physical Systems with Cyber Securities Case Studies”, CRC press, 2019
Houbing Song, Glenn A.Fink, Sabina Jesche, “Security and Privacy in Cyber-Physical
Systems: Foundations, Principles and Solutions”, IEEE Press.
Describe the basics of securing Internet of Things.
Explain architecture and threats in IoT.
Analyze various privacy schemes related to IoT
Describe the authentication mechanisms for IoT security and privacy.
Explain security issues for various applications using case studies
Shancang Li, Li Da Xu, “Securing the Internet of Things,” Syngress (Elsevier)publication, 2017, ISBN: 978-0-12-804458-2.
Fei Hu, “Security and Privacy in Internet of Things (IoTs): Models, Algorithms, andImplementations,” CRC Press (Taylor & Francis Group), 2016, ISBN:978-1-4987- 23190.
Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A Hands-on approach,” VPTPublishers, 2014, ISBN: 978-0996025515.
Alasdair Gilchris, “Iot Security Issues,” Walter de Gruyter GmbH & Co, 2017.
Sridipta Misra, Muthucumaru Maheswaran, Salman Hashmi, “Security Challenges andApproaches in Internet of Things,” Springer, 2016. 6. Brian Russell, Drew Van Duren,“Practical Internet of Things Security,” Packet Publishing Ltd, 2016.
Understand the role of IIOT in manufacturing processes
Apply knowledge of IIoT design considerations and IIoT technologies to develop solutions for industries
Collect, communicate and leverage the IIoT data
Analyze the IIoT data by using various machine learning algorithms
Identify, formulate and solve engineering problems by using Industrial IoT.
Unit I: Introduction to Industrial Internet of Things and Industry 4.0: Basics of Industry 4.0, Basics of Industrial Internet of Things (IIoT), Evolution of IIoT – understanding the IT & OT (Operational Technology) convergence, OT components like Industrial control systems, PLC, SCADA, and DCS, Industrial Edge, Open loop and closed loop controls, Components of IIOT, Role of IIOT in Manufacturing Processes, Challenges & Benefits in implementing IIOT, Adoption of IIoT, Market trends and opportunities in IIoT
Unit II: Technological Aspects of Industry 4.0 and IIoT: Industrial processes, Industrial sensing and actuation, Industrial networks, Machine-to-machine networks, Business Models and Reference Architecture of IIoT, IIoT design considerations, Key Technologies: Off-site Technologies, On-site Technologies
Unit IV: IIoT Analytics: Big Data Analytics and Software Defined Networks, Machine Learning and Data Science in Industries, Security and Fog computing in IIoT
Unit V: Applications of IIoT and Case Studies: Healthcare Applications in Industries, Inventory Management and Quality Control, Plant Safety and Security, Oil, chemical and pharmaceutical industry, Integration of products, processes, and people, Smart factories and cyber-physical systems, Case Studies, IIoT Application Development, Protocols used in building IIoT applications
“Introduction to Industrial Internet of Things and Industry 4.0”, By Sudip Misra Chandana Roy,Anandarup Mukherjee, CRC Press, 2020
“Industrial Internet of Things for Developers”, Ryane Bohm, Wiley
“Handbook of Industry 4.0 and Smart Systems”, Diego Galar Pascual, Pasquale Daponte, UdayKumar, CRC Press, 2019
Data-driven decisions, data pipeline infrastructure for data-driven decisions, role of the data engineer in data-driven organizations, Modern data strategies, Introduction to elements of Data, the five Vs of data – volume, velocity, variety, veracity, and value, Variety – data types & data sources, Activities to improve veracity and value.
The evolution of data architectures, Modern data architecture on various cloud platforms, Modern data architecture pipeline - Ingestion and storage, Modern data architecture pipeline - Processing and Consumption, Streaming analytics pipeline
Cloud security, Security of analytics workloads, ML security, Scaling Data Pipeline, creating a scalable infrastructure, Creating scalable components.
ETL and ELT comparison, Data wrangling, Data Discovery, Data structuring, Data Cleaning, Data enriching, Data validating, Data publishing
Comparing batch and stream ingestion, Batch ingestion processing, Purpose-built data ingestion tools, Scaling considerations for batch processing, stream processing, Scaling considerations for stream processing, Ingesting IoT data by stream
Storage in the modern data architecture, Data Lake storage, Data warehouse storage, Purpose-built databases, Storage in support of the pipeline, Securing storage.
Big data processing concepts, Apache Hadoop, Apache Spark, Amazon EMR
ML Concepts, ML Lifecycle, Framing the ML problem to meet the business goal, Collecting data, Applying labels to training data with known targets, Pre-processing data, Feature engineering, Developing a model, Deploying a model, ML infrastructure on AWS, AWS SageMaker, Automating the Pipeline, Automating infrastructure deployment, CI/CD, Automating with Step Functions.
7 - 10 experiments to be framed as per the syllabus.
Designing Data-Intensive Applications: The Big Ideas Behind Reliable, Scalable, and Maintainable Systems, by Martin Kleppmann
T-SQL Querying (Developer Reference) by Itzik Ben-Gan
The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modelling by Margy Ross
Spark: The Definitive Guide: Big Data Processing Made Simple by Bill Chambers
Data Pipelines with Apache Airflow by Bas P. Harenslak
Streaming Systems: The What, Where, When, and How of Large-Scale Data Processing by Tyler Akidau
Kubernetes in Action by Marko Luksa